Correlation attack on stream ciphers

Download
1998
Birinci, Fatih

Suggestions

Correlation tracking based on wavelet domain information
Ipek, HL; Yilmaz, I; Yardimci, YC; Cetin, AE (2003-08-07)
Tracking moving objects in video can be carried out by correlating a template containing object pixels with pixels of the current frame. This approach may produce erroneous results under noise. We determine a set of significant pixels on the object by analyzing the wavelet transform of the template and correlate only these pixels with the current frame to determine the next position of the object. These significant pixels are easily trackable features of the image and increase the performance of the tracker.
Correlation analyses of the results of marshall and CKE tests.
Kubilay, İsmail Hakki; Department of Civil Engineering (1983)
Correlation Loss: Enforcing Correlation Between Classification and Localization in Object Detection
Kahraman, Fehmi; Kalkan, Sinan; Akbaş, Emre; Department of Computer Engineering (2022-8-18)
Object detectors are conventionally trained by a weighted sum of classification and localization losses. Recent studies (e.g., predicting IoU with an auxiliary head, Gen eralized Focal Loss, Rank & Sort Loss) have shown that forcing these two loss terms to interact with each other in non-conventional ways creates a useful inductive bias and improves performance. Inspired by these works, we focus on the correlation be tween classification and localization and make two main contributions in this thesis: (i) W...
Overlapping decompositions into weakly coupled subsystems.
Arabacıoğlu, I Müjdat; Department of Electrical Engineering (1984)
WEIGHTED MATRIX ORDERING AND PARALLEL BANDED PRECONDITIONERS FOR ITERATIVE LINEAR SYSTEM SOLVERS
Manguoğlu, Murat; Sameh, Ahmed H.; Grama, Ananth (Society for Industrial & Applied Mathematics (SIAM), 2010-01-01)
The emergence of multicore architectures and highly scalable platforms motivates the development of novel algorithms and techniques that emphasize concurrency and are tolerant of deep memory hierarchies, as opposed to minimizing raw FLOP counts. While direct solvers are reliable, they are often slow and memory-intensive for large problems. Iterative solvers, on the other hand, are more efficient but, in the absence of robust preconditioners, lack reliability. While preconditioners based on incomplete factor...
Citation Formats
F. Birinci, “Correlation attack on stream ciphers,” Middle East Technical University, 1998.